In this section of the research paper, the illustration and elaboration of the advantages and future developments in regards to the development of home securities systems for domestic homes are conducted.It has been observed that specialists don't concur with respect to what constitutes residential security and diverse definitions have been put to use in earlier researches.The difference on the definition tends to incorporate the concentration on the tasks of the associated with the job, the influence on the clients and the profit along with the inclusion of the products providing domestic services like distribution, manufacturing, and installation of technology and equipment. Installing, disarming, arming and paying monthly fees along with dealing with false alarms have been considered among all such things which are tied to the Blockchain domestic security system s which also may result in making clients wonder whether home security is worth to be used (Gunge & Yalagi, 2016).
One of the research studies states that domestic security includes all kinds of private organizations and domestic clients who would desire of all kinds of security related services such as investigation, patrol, guard, alarm, lie detection. One of the most common facilities and benefits of using Blockchain Blockchain domestic security system is prevention and detection of crime in houses (Korzyk, 1999). It has also been observed from previous studies that domestic security services provide security and protection against crime along with different threats accident, error, waste and unethical practice. Various instances in the researches also prove that integration Blockchain Blockchain domestic security system also enhance protection to the private valuables. This is definitely the most important benefits that people and clients look for.
The events of theft of electronics, jewelry and other items which are of great domestic value in the cases of a home invasion can be very well monitored. It is found that the tragedy in the household is aggravated when the profitable thing is a genuine vital treasure of the family. Having a residential security framework incorporates an alert which drives away many hoodlums and robbers who would be planning to approach the house premises. Moreover, the Blockchain Blockchain domestic security system would also assist in notifying the local authorities regarding the attempt made by the thieves and the burglars. It has been also observed according to 20009 Study by Rutgers that in the instances where the number of Blockchain Blockchain domestic security system increase in a particular area, there is a decrease in the cases of thefts and robberies in that specific area (Strom et al., 2010). It has proved to be beneficial for the people residing in that area who are not even availing or have Blockchain domestic security systems installed in their houses. It has been seen that having a Blockchain domestic security system not only assists in protecting a single house but also helps the entire neighborhood to be a safer place. Modern Blockchain domestic security system have been facilitating the clients to remotely monitor the events and activities happening in their homes during their absence (Wuest et al,2015).
Depending on the provider, the clients and consumers are able to regulate what is happening through the cameras which are installed all throughout their home along with controlling the thermostat, lights, doors and other devices present in their homes. It has been observed through various research studies that despite the fact that the clients and consumers have to pay a monthly and annual fee for the Blockchain domestic security systems, they are finding their insurance regarding home owners to decrease by 20 percent by having the security system on the premises (Ann Sykes, 2015).
The clients and the consumers of domestic security services have the facility of opting to receive notifications is the carbon monoxide or smoke alarms go off in the absence of the client or the consumer. Depending on the provider, the clients and the consumers can set it up as the security service providers are notified regarding such emergencies instantly. It has also been a great aspect of the Blockchain domestic security system that the clients and consumers can incorporate the service into their mobile app (Dunn, Gerard & Grabski, 2016). The Blockchain domestic security system users can use their mobile devices to observe what is happening in their respective home through cameras which facilitate them to have an observance on their teen children during their absence. In the case where the clients and consumers have automatic doors installed in their homes, they can even remotely unlock the doors to let their children in after completion of schools so they will not have to get worried regarding carrying or losing a key to their house (Ekman, 2015).
The installation and utilization of the Blockchain domestic security system have been observed in various research studies to be providing security regarding the smart outlets and thermostats. The clients and consumers have been making use of the gadgets which allow them to take the control over the thermostat on any kind of web-enabled device. Through various studies, it has been observed that the clients using domestic security services happen to gain a sense of peace and security with the use of an alarm system which is one of the key benefits of using such security which would help in gaining a technically advance home in the future. Being safe and feeling confidence has been helping the consumers to be healthier, more productive and focused lifestyles. Addition of Blockchain domestic security system provides the consumers with an extra sense of defense against any sort of potential intruders (Li, Grundy & Hosking, 2014).
The use of Blockchain domestic security system has the potential to provide the Virtual Training to the consumers with the development and advancement of technologies. Having such kind of developed and advanced technology integrated within the domestic security service would assist in creating an IT home of the future.
For obtaining effective literature review, analysis of secondary data was conducted which serves two key purposes. First and foremost, it facilitates in determining what kind of information can be utilized for making a comparison to the specified data that is planned to collect. This has also provided a comprehension regarding how the other measures of the literature review or define the main items (Murray, Spassov & Mitchell, 2017). Moreover, by conducting an assessment of the information that is available, the analysis will be helpful in identifying the gaps in the literature and providing with effective gap analysis.
Furthermore, the investigation of optional information encourages in regards to the appraisals of the nature of information accessible in people in general space. Measures of value incorporate to what degree the information are present or most recent; the technique utilized in the collection of data includes the mode of collection of data, the identification of respondents which includes the representative sofa the company or the individuals involved in an occupation along with the response rate of the survey (Oba & Yamaguchi, 2014).
It also includes the definitions used while structuring the research studies like sampling and target populations. This information can be utilized in the development of a survey structure that uses approaches from the previous research studies which have a high and enhanced quality of data.
Sources of secondary data
This examination of auxiliary information endeavor to have a powerful audit of the accessible information with respect to the local security administrations from different business sources, an administration source, scholarly and look into sources. A word related approach for the investigation of household security framework focused on the part of big business frameworks. Particular occupations are classified into general segments for the information gathering and testing purposes (Peiris, Jung and Gallupe, 2015).
For example, the Standard Occupational Classification (SOC) framework which is characterized by the Department of Labor and is being used by every one of the wellsprings of government incorporates the occupations and administrations in the meaning of security watches. The obligations of the concerned security watches are delineated as watching, guarding, or checking the household premises for counteractive action of brutality, infractions of principles and robbery.
Information from word related approach is extremely helpful with respect to the evaluation of data about the general parts of the security occupations and residential security benefits as they happen to incorporate the security officers giving household security from both the non-security and security firms. Additionally, this approach encourages the social affair of information specifically from the people in the occupation; it can advantageously encourage the acquisition of an itemized normal for representatives, for example, socioeconomics (Pollock and Hyysalo, 2014). This is because of the individual is the measuring unit and only one out of every odd data with respect to the local security specialist organization is known.
Case Study Approach
The next approach used in the methodology is the case study approach in which the complexity of the single case regarding Blockchain domestic security system is captured. In the given case its explain about the GHOST how it’s going to adapt the software and exploit to make sure that no one going to tamper it (Blockchain making houses safer, 2017). This approach of methodology enables the integration of social science in the subject like GHOST will do. This approach also integrated the aspects of social sciences like psychology, sociology, and practice oriented like studies of the environment (Rai & Hornyak, 2013). The use of case study approach also has facilitated in the subject of the study which involves the functioning unit that is complex in nature. It helps to understand the thing like here how GHOST as new technology in Blockchain service system will secure everyone house from outsiders. The entire scenario of domestic security service is investigated in its most natural context with varying methods which are contemporary in nature.
One of the major features of the using this approach of a methodology is that varying methods are integrated with the purpose of focusing on the Blockchain domestic service system from varying angles for the triangulation by combining the methodology (Soja, 2016). The association between various research strategies in the field of a Blockchain domestic security system is reflected in the similarities rather than the differences. Interpretive and qualitative research has a holistic approach in common to the research subject along with having varying perspective sofa time.
In addition to the comprehension of how every secondary source of data defines the Blockchain domestic security system, it is similarly critical to comprehend the sort of system utilized as a part of the gathering of information. This encourages an evaluation of the information agents for the entire field of local security (Wang, et al., 2016). Framework, in addition, the examination philosophy gives inside and out understanding into the information quality in parts of a rate of reaction and different variables which may bring about the estimation of blunder and one-sided gauges (Sykes, Venkatesh and Johnson, 2014).
This specific segment incorporates the philosophy of the accumulation of information utilized by each wellspring of optional information (Walther, et al., 2013).
Justification of Method
The feasibility study in the case study pertains to the exploration of the intervention of the specific issues, like research protocols and methods, relevance to the specific context and practicality along with efficacy potential. However, undue emphasis is mostly placed on the efficacy potential in the literature review. Lessons and outcomes regarding various aspects of the feasibility of Blockchain domestic security systems such as implications or practicality for the protocols of research are not widely shared (Themistocleous, Corbitt & da Cunha, 2017).
The purpose of using the feasibility analysis of the Blockchain domestic security systems as case study is to address the gaps in the literature review by presenting the use of the feasibility study while assessing the demand, acceptability, implementation, practicality, efficacy potential, integration, and adaptation.
Using the gap analysis in the methodology of the mentioned case facilitates in assessing if the services providers of Blockchain domestic security can meet their needs of using the current capabilities in the sector. The capabilities of the service provider may be further put for examination in regards to future improvement which would include the facilities applications, competencies of the staff, technical infrastructure, business lines, processes, etc, (Veiga, et al., 2014).
There has been a comparison regarding the present scenario of the use of Blockchain domestic security system and future advances that can assist in having IT home of the future. The current scenario has been analyzed and with the help of gap analysis, the flaws in the Blockchain domestic security system and its implications are reflected. The literature review paper presents the concept of a Blockchain domestic security system in a more descriptive method through which many justifiable aspects of using the system could be gained (Upadhyay, et al., 2016). For the future work in this specific field, encouragement to consider the installation of a Blockchain domestic security system is recommended which would help in the identification and prevention of sophisticated and skilled intruders. Security is essential for the implementation along with the development of lives. With the help of the literature review, various insights into the significance of the use of such service are reflected.
Ann Sykes, T. (2015). Support structures and their impacts on employee outcomes: A longitudinal field study of an enterprise system implementation. MIS quarterly, 39(2).
Blockchain making houses safer. (2017). M.techxplore.com. Retrieved 8 September 2017, from
Dunn, C. L., Gerard, G. J., & Grabski, S. V. (2016). Resources-Events-Agents Design Theory: A Revolutionary Approach to Enterprise System Design. CAIS, 38, 29.
Ekman, P. (2015). The enterprise system revisited: how well does it capture the company’s business network?. Journal of Business & Industrial Marketing, 30(2), 208-217.
Gunge, V. S., & Yalagi, P. S. (2016). Smart Home Automation: A Literature Review. International Journal of Computer Applications, 6-10.
Korzyk Sr, A. D. (1999). Towards security of integrated enterprise systems management. In 22nd NISTNCSC National Information Systems Security Conference.
Li, L., Grundy, J., & Hosking, J. (2014). A visual language and environment for enterprise system modelling and automation. Journal of Visual Languages & Computing, 25(4), 253-277.
Murray, K. T., Spassov, M. I., & Mitchell, A. J. (2017). U.S. Patent No. 9,720,669. Washington, DC: U.S. Patent and Trademark Office.
Oba, M., & Yamaguchi, T. (2014). A flexible and efficient system development approach for enterprise system and smartphone application. WSEAS Transactions on Communications, 13(9), 414-420.
Pathan, T. A., Tamboli, M. A., Shaikh, S. S., Jamadar, A. A., & Patil, J. M. Development of Total Security System for Residential and Commercial Buildings.
Peiris, K. D. A., Jung, J., & Gallupe, R. B. (2015). Building and evaluating ESET: A tool for assessing the support given by an enterprise system to supply chain management. Decision Support Systems, 77, 41-54.
Pollock, N., & Hyysalo, S. (2014). The business of being a user: The role of the reference actor in shaping packaged enterprise system acquisition and development. MIS quarterly, 38(2).
Rai, A., & Hornyak, R. (2013). The impact of sourcing enterprise system use and work process interdependence on sourcing professionals’ job outcomes. Journal of Operations Management, 31(6), 474-488.
Strom, K., Berzofsky, M., Shook-Sa, B., Barrick, K., Daye, C., Horstmann, N., & Kinsey, S. (2010). The private security industry: A review of the definitions, available data sources, and paths moving forward. Washington DC: US Department of Justice.
Soja, P. (2016). Reexamining critical success factors for enterprise system adoption in transition economies: Learning from Polish adopters. Information Technology for Development, 22(2), 279-305.
Sykes, T. A., Venkatesh, V., & Johnson, J. L. (2014). Enterprise system implementation and employee job performance: Understanding the role of advice networks. MIS quarterly, 38(1).
Themistocleous, M., Corbitt, G., & da Cunha, P. R. (2017, January). Introduction to Enterprise System Integration: Issues and Answers Minitrack. In Proceedings of the 50th Hawaii International Conference on System Sciences.
Upadhyay, P., Upadhyay, P., Kundu, A., Kundu, A., Nair, S., & Nair, S. (2016). On managing business, organization climate and enterprise system implementation: Insights from Indian MSMEs. Journal of Workplace Learning, 28(8), 472-483.
Veiga, J. F., Keupp, M. M., Floyd, S. W., & Kellermanns, F. W. (2014). The longitudinal impact of enterprise system users’ pre-adoption expectations and organizational support on post-adoption proficient usage. European Journal of Information Systems, 23(6), 691-707.
Walther, S., Sedera, D., Sarker, S., & Eymann, T. (2013). Evaluating Operational Cloud Enterprise System Success: An Organizational Perspective. In ECIS (p. 16).
Wang, H., Fu, Y., Huang, M., & Wang, J. (2016). Multiobjective optimisation design for enterprise system operation in the case of scheduling problem with deteriorating jobs. Enterprise Information Systems, 10(3), 268-285.
Wuest, J., Merritt?Gray, M., Dub?, N., Hodgins, M. J., Malcolm, J., Majerovich, J. A., ... & Varcoe, C. (2015). The process, outcomes, and challenges of feasibility studies conducted in partnership with stakeholders: a health intervention for women survivors of intimate partner violence. Research in nursing & health, 38(1), 82-96.